First published: Fri Sep 11 2020(Updated: )
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ansible Engine | <2.9.12 | |
Debian Debian Linux | =10.0 | |
debian/ansible | 2.7.7+dfsg-1+deb10u1 2.7.7+dfsg-1+deb10u2 2.10.7+merged+base+2.10.8+dfsg-1 7.3.0+dfsg-1 7.7.0+dfsg-3 | |
pip/ansible | <2.10.0 | 2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14330 is an Improper Output Neutralization for Logs flaw in Ansible.
The severity of CVE-2020-14330 is medium with a CVSS score of 5.5.
CVE-2020-14330 affects Ansible when using the uri module, exposing sensitive data to content and json output.
The affected software versions for CVE-2020-14330 include Ansible Engine up to version 2.9.12 and Debian Linux version 10.0.
To fix CVE-2020-14330, update Ansible to version 2.7.7+dfsg-1+deb10u1, 2.10.7+merged+base+2.10.8+dfsg-1, 7.3.0+dfsg-1, or 7.7.0+dfsg-3.